Threat in context
is a detection of an exploit which uses CVE-2013-2551 vulnerability to run the code on a remote machine. This malware exploits Internet Explorer's COALineDashStyleArray class in SVG VML component the using use-after-free condition. It is normally served in a browser context.
What is an exploit?
Exploits are written to take advantage of weaknesses (or vulnerabilities) in legitimate software. A project called Common Vulnerabilities and Exposures (CVE) gives each vulnerability a unique number, in this case "CVE-2013-2551".
You can find more information on the CVE website or on our page about exploits.
This threat downloads and runs malicious programs.
We have seen it download variants from several malware families, including Win32/Simda, Win32/Urausy, Win32/Karagany, Win32/Reveton, Win32/Sirefef.
This exploit is distributed among the following Exploit Kits: Fiesta, Angler, Magnitude, Nuclear, and others.
Analysis by Justin Kim
Alerts from your security software might be the only symptom.
It's also important to keep your other software up to date: